Koji Okada

According to our database1, Koji Okada authored at least 18 papers between 1980 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Applying Business Ecosystem Analysis Methods into Edge Computing Device Business for E-Solutions.
Proceedings of 11th International Congress on Advanced Applied Informatics, 2021

2020
Proposal of a Method Extracting Strategic Phrases from Japanese Enterprise Disclosure Documents.
Proceedings of the 9th International Congress on Advanced Applied Informatics, 2020

2018
Proposal of a Method to Understand and Model Dynamic Mechanisms Existing in Business Context.
Proceedings of the 7th International Congress on Advanced Applied Informatics, 2018

2017
Estimation of Risk Countermeasure Effects Based Upon Project-Behavior Simulation System.
Proceedings of the 6th IIAI International Congress on Advanced Applied Informatics, 2017

2011
Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption.
Proceedings of the Advances in Information and Computer Security, 2011

2008
Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices.
Proceedings of the Advances in Information and Computer Security, 2008

2002
On the bound for anonymous secret sharing schemes.
Discret. Appl. Math., 2002

2000
MDS secret-sharing scheme secure against cheaters.
IEEE Trans. Inf. Theory, 2000

1998
New Combinatorial Bounds for Authentication Codes and Key Predistribution Schemes.
Des. Codes Cryptogr., 1998

1996
Combinatorial Lower Bounds for Secret Sharing Schemes.
Inf. Process. Lett., 1996

1995
Low Exponent Attack Against Elliptic Curve RSA.
Inf. Process. Lett., 1995

1994
Lower Bound on the Size of Shares of Nonperfect Secret Sharing Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

Security of the Center in Key Distribution Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

Combinatorial Interpretation of Secret Sharing Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1993
Nonperfect Secret Sharing Schemes and Matroids.
Proceedings of the Advances in Cryptology, 1993

1987
Parameterized Programming in OBJ2.
Proceedings of the Proceedings, 9th International Conference on Software Engineering, Monterey, California, USA, March 30, 1987

1982
A Hierarchical Structuring Method for Functional Software Systems.
Proceedings of the Proceedings, 1982

1980
Specification Writing as Construction of Hierarchically Structured Clusters of Operators.
Proceedings of the Information Processing, Proceedings of the 8th IFIP Congress 1980, Tokyo, Japan - October 6-9, 1980 and Melbourne, Australia, 1980


  Loading...